First published: Thu Feb 28 2008(Updated: )
Description of problem: The default IPSec ifup script (/etc/sysconfig/network-scripts/ifup-ipsec) initializes the racoon configuration to use aggressive IKE mode, then fallback to main IKE mode if that fails: ... remote $DST { exchange_mode aggressive, main; ... Due to widely known attacks, the aggressive mode should be only used when public key authentication is in use. In practice, most administrators use IPSec with PSK authentication, which combined with aggressive mode leads to aforementioned vulnerability. See this whitepaper for more information: <a href="http://www.netsc.ch/IMG/pdf/TargetingIKE_en.pdf">http://www.netsc.ch/IMG/pdf/TargetingIKE_en.pdf</a> The exchange_mode should be changed to "main" only or, for a low-security fallback, to "main, aggressive" (in the opposite order than currently).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1198 is classified as a medium severity vulnerability due to its potential to allow unauthorized access through insecure configuration.
CVE-2008-1198 affects Red Hat Enterprise Linux versions 3.0, 4.0, and 5.0.
To mitigate CVE-2008-1198, disable aggressive IKE mode in the racoon configuration or upgrade to a patched version of the software.
The main issue with CVE-2008-1198 is that it allows a fallback to a vulnerable aggressive IKE mode that is susceptible to known attacks.
A potential workaround for CVE-2008-1198 is to manually adjust the IPSec ifup script to prioritize secure modes over aggressive ones.